<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="http://13.232.72.61:8080/jspui/handle/123456789/459">
    <title>DSpace Collection:</title>
    <link>http://13.232.72.61:8080/jspui/handle/123456789/459</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="http://13.232.72.61:8080/jspui/handle/123456789/3367" />
        <rdf:li rdf:resource="http://13.232.72.61:8080/jspui/handle/123456789/3366" />
        <rdf:li rdf:resource="http://13.232.72.61:8080/jspui/handle/123456789/3363" />
        <rdf:li rdf:resource="http://13.232.72.61:8080/jspui/handle/123456789/493" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-03T18:02:26Z</dc:date>
  </channel>
  <item rdf:about="http://13.232.72.61:8080/jspui/handle/123456789/3367">
    <title>Algorithm to Identify Kannada Vowels using Minimum Features Extraction method</title>
    <link>http://13.232.72.61:8080/jspui/handle/123456789/3367</link>
    <description>Title: Algorithm to Identify Kannada Vowels using Minimum Features Extraction method
Authors: Prasanna Kumar, KS
Abstract: This paper introduces a novel way of feature extraction for Optical Character Recognition (OCR) customized for Kannada characters. The algorithm described here relies on breaking the character into four equal parts and using one of the quarters for extraction. The algorithm is deliberately kept away from all the complexities and the number of features to be extracted is also minimized so as to increase the efficiency and speed of recognition. The algorithm also describes a conflict resolution technique helpful in effectively utilizing the algorithm.</description>
    <dc:date>2013-01-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://13.232.72.61:8080/jspui/handle/123456789/3366">
    <title>Policy Reasoner: An Appoarch for Security to RDF</title>
    <link>http://13.232.72.61:8080/jspui/handle/123456789/3366</link>
    <description>Title: Policy Reasoner: An Appoarch for Security to RDF
Authors: Viswasanathan, C., Deepti, AR.
Abstract: This paper focuses on the security methods for Resource Description Framework (RDF). The open nature of the semantic web hinges on the seamless autonomous interoperable communications among unknown entities and formats. This envisioned semantic web is expected to raise new security concerns. This paper presents the survey of existing work on security methods at the basic level of RDF for semantic web integration. Through this survey we found that most of the security measures are specified using access control policies for triple referencing and inference protection. For the later, there is least research work initiated. Thus, in this paper, we propose a Policy-Reasoner for RDF, a combination of access specification as well, a reasoning engine, which address the security issues at large in RDF triples level.</description>
    <dc:date>2014-12-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://13.232.72.61:8080/jspui/handle/123456789/3363">
    <title>Deployment Techniques of Nodes in WSN for Multi-Domain Applications A Survey on their performance analysis</title>
    <link>http://13.232.72.61:8080/jspui/handle/123456789/3363</link>
    <description>Title: Deployment Techniques of Nodes in WSN for Multi-Domain Applications A Survey on their performance analysis
Authors: Mamatha, G., Premasudha, BG.
Abstract: Wireless Sensor Network has been very interesting topic of research since many years. This survey paper focuses on performance comparison of different spatial Wireless Sensor Node (WSN) deployment algorithms that have been proposed and reviewed by many researchers through the years. The primary challenge will face in designing wireless sensor networks (WSNs) is to find tradeoff between the desired and contrary requirements for the lifetime, coverage or cost while coping with the computation, energy and communication constraints. This paper examines the optimal placement of nodes for a WSN. It is impractical to decide the deployment of the nodes separately from WSNs applications. This paper highlights the properties of WSNs applications which determine the placement problem. This work also identifies and analyzes the various objectives that should be considered while designing WSN. This paper also gives an overview and importance on multi-objective strategies, their assumptions, and optimization.</description>
    <dc:date>2013-12-01T00:00:00Z</dc:date>
  </item>
  <item rdf:about="http://13.232.72.61:8080/jspui/handle/123456789/493">
    <title>Enabling Multi keyword Search on Secure Encrypted Data using Multi Cloud Approach.</title>
    <link>http://13.232.72.61:8080/jspui/handle/123456789/493</link>
    <description>Title: Enabling Multi keyword Search on Secure Encrypted Data using Multi Cloud Approach.
Authors: Mamatha, G.; Hegde, Ramesh; Swarna, Shilpitha; Lakshmikanthaiah, S. M.
Abstract: Cloud computing provides lot of benefits to enterprises to offload their data and software services to cloud saving them lot of money that has to be spent on infrastructure setup cost. Enterprises wanted to offload their data to cloud and save on their infrastructure cost. But when offloading the data security and privacy is a important concern. When the data offloaded to cloud by a enterprise is compromised, the enterprise will lose its business. Similarly when the hospitals and health care organization upload their patients details to cloud and when the data is comprised, it will affect the privacy of the patients. So privacy is a important concern when offloading the data to cloud. Most of solutions for privacy is based on encryption and data to be offloaded is encrypted and stored in cloud. Algorithms like AES, DES etc are used for encrypting the data before offloading to cloud. But the side effect in this encryption mechanism is that, the encrypted data is not order preserving and it is not suitable for searching and ranking. To solve it in work [1], author has proposed homomorphic encryption based mechanism. But the solution suffers from capture attack and relies on semi trust model on cloud. In this paper, we discuss the capture attack in detail and propose a solution based on multi cloud to avoid the same.</description>
    <dc:date>2017-11-01T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

